default search action
DIMVA 2017: Bonn, Germany
- Michalis Polychronakis, Michael Meier:
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings. Lecture Notes in Computer Science 10327, Springer 2017, ISBN 978-3-319-60875-4
Enclaves and Isolation
- Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. 3-24 - Shruti Tople, Prateek Saxena:
On the Trade-Offs in Oblivious Execution Techniques. 25-47 - Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis:
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems. 48-69
Malware Analysis
- Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero:
Measuring and Defeating Anti-Instrumentation-Equipped Malware. 73-96 - Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua:
DynODet: Detecting Dynamic Obfuscation in Malware. 97-118 - George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert:
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. 119-138
Cyber-physical Systems
- Mark Luchs, Christian Doerr:
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems. 141-160 - Mordechai Guri, Boris Zadov, Yuval Elovici:
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. 161-184 - Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero:
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. 185-206
Detection and Protection
- Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla:
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps. 209-229 - Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li:
SPEAKER: Split-Phase Execution of Application Containers. 230-251 - Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou:
Deep Ground Truth Analysis of Current Android Malware. 252-276
Code Analysis
- Sam L. Thomas, Flavio D. Garcia, Tom Chothia:
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. 279-300 - Paria Shirani, Lingyu Wang, Mourad Debbabi:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. 301-324 - Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong:
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. 325-344
Web Security
- Olivier Heen, Christoph Neumann:
On the Privacy Impacts of Publicly Leaked Password Databases. 347-365 - Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders, Markus Happe, Laurent Vanbever:
Unsupervised Detection of APT C&C Channels using Web Request Graphs. 366-387 - Yizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon:
Measuring Network Reputation in the Ad-Bidding Process. 388-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.